breakerspace / weaponizing-residual-censorship
your censor is my censor: weaponizing residual censorship to perform availability attacks
☆22Updated 3 years ago
Alternatives and similar repositories for weaponizing-residual-censorship:
Users that are interested in weaponizing-residual-censorship are comparing it to the libraries listed below
- censors pose a threat to the entire Internet☆133Updated 3 years ago
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆16Updated last year
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆120Updated 3 weeks ago
- T-Pot Attack Map that follows ES honeypot events within T-Pot and parses IPs, ports and honeypot info to visualize events in real time.☆28Updated 5 months ago
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆55Updated 4 years ago
- Network Tools☆32Updated last year
- Repository for the IPvSeeYou talk at Black Hat 2021☆82Updated 2 years ago
- (SP)^3: A Simple, Practical, and Safe Packet Spoofing Protocol☆13Updated 8 years ago
- A wireshark/tshark plugin for the JA3 TLS Client Fingerprinting Algorithm☆58Updated last year
- Clone network interface from one host as a tap interface on another host☆59Updated 4 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆32Updated 2 weeks ago
- packet captures of real-world ddos attacks☆159Updated 2 years ago
- GQUIC Protocol Analyzer for Zeek (Bro) Network Security Monitor☆76Updated last year
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated 7 months ago
- Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.☆10Updated 4 years ago
- collect logs and alerts from 27 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.☆16Updated 3 weeks ago
- goscanner is a tool for large-scale TLS and SSH scans☆31Updated 11 months ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 11 months ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- IoT and Operational Technology Honeypot☆105Updated last year
- Client library for the mwdb service by CERT Polska.☆40Updated 5 months ago
- Open YARA scan- and search engine☆22Updated 2 months ago
- TCP port scan detection tool☆60Updated 2 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pa…☆130Updated last year
- Exploit, Malware and Vulnerability Scoring Application☆13Updated last year
- Web Application for domain name monitoring / alerting☆63Updated 8 months ago
- Hourly Checked and Updated Spamhaus IP Addresses lists☆45Updated last year
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆72Updated 9 months ago
- Script fingerprinting systems based on shodan.io data☆13Updated 6 years ago